Vulnerability Details CVE-2021-26593
In Directus 8.x through 8.8.1, an attacker can see all users in the CMS using the API /users/{id}. For each call, they get in response a lot of information about the user (such as email address, first name, and last name) but also the secret for 2FA if one exists. This secret can be regenerated. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 54.1%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2021-26593
-
cpe:2.3:a:rangerstudio:directus:8.0.0
-
cpe:2.3:a:rangerstudio:directus:8.0.1
-
cpe:2.3:a:rangerstudio:directus:8.0.2
-
cpe:2.3:a:rangerstudio:directus:8.1.0
-
cpe:2.3:a:rangerstudio:directus:8.2.0
-
cpe:2.3:a:rangerstudio:directus:8.3.0
-
cpe:2.3:a:rangerstudio:directus:8.3.1
-
cpe:2.3:a:rangerstudio:directus:8.4.0
-
cpe:2.3:a:rangerstudio:directus:8.5.0
-
cpe:2.3:a:rangerstudio:directus:8.5.1
-
cpe:2.3:a:rangerstudio:directus:8.5.2
-
cpe:2.3:a:rangerstudio:directus:8.5.3
-
cpe:2.3:a:rangerstudio:directus:8.5.4
-
cpe:2.3:a:rangerstudio:directus:8.5.5
-
cpe:2.3:a:rangerstudio:directus:8.6.0
-
cpe:2.3:a:rangerstudio:directus:8.6.1
-
cpe:2.3:a:rangerstudio:directus:8.6.2
-
cpe:2.3:a:rangerstudio:directus:8.7.0
-
cpe:2.3:a:rangerstudio:directus:8.7.1
-
cpe:2.3:a:rangerstudio:directus:8.7.2
-
cpe:2.3:a:rangerstudio:directus:8.8.0
-
cpe:2.3:a:rangerstudio:directus:8.8.1